必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.4.30.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.4.30.120.			IN	A

;; AUTHORITY SECTION:
.			302	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:38:42 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 120.30.4.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.30.4.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.67.106.137 attack
2020-08-07T05:45:18.170975amanda2.illicoweb.com sshd\[1433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.106.137  user=root
2020-08-07T05:45:20.397210amanda2.illicoweb.com sshd\[1433\]: Failed password for root from 114.67.106.137 port 42472 ssh2
2020-08-07T05:50:03.012994amanda2.illicoweb.com sshd\[2331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.106.137  user=root
2020-08-07T05:50:05.364664amanda2.illicoweb.com sshd\[2331\]: Failed password for root from 114.67.106.137 port 42760 ssh2
2020-08-07T05:52:11.364220amanda2.illicoweb.com sshd\[2949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.106.137  user=root
...
2020-08-07 17:01:10
182.61.43.154 attack
Aug  7 08:17:52 ovpn sshd\[801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.154  user=root
Aug  7 08:17:54 ovpn sshd\[801\]: Failed password for root from 182.61.43.154 port 59136 ssh2
Aug  7 08:36:08 ovpn sshd\[25608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.154  user=root
Aug  7 08:36:10 ovpn sshd\[25608\]: Failed password for root from 182.61.43.154 port 52666 ssh2
Aug  7 08:38:40 ovpn sshd\[26640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.154  user=root
2020-08-07 17:20:07
37.187.149.98 attack
Aug  7 12:01:16 pkdns2 sshd\[61969\]: Invalid user mahout from 37.187.149.98Aug  7 12:01:18 pkdns2 sshd\[61969\]: Failed password for invalid user mahout from 37.187.149.98 port 49394 ssh2Aug  7 12:05:26 pkdns2 sshd\[62166\]: Invalid user knox from 37.187.149.98Aug  7 12:05:27 pkdns2 sshd\[62166\]: Failed password for invalid user knox from 37.187.149.98 port 39844 ssh2Aug  7 12:09:33 pkdns2 sshd\[62320\]: Invalid user slider from 37.187.149.98Aug  7 12:09:34 pkdns2 sshd\[62320\]: Failed password for invalid user slider from 37.187.149.98 port 58254 ssh2
...
2020-08-07 17:18:56
172.82.239.22 attackbots
Aug  7 10:03:51 mail.srvfarm.net postfix/smtpd[3279902]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug  7 10:06:20 mail.srvfarm.net postfix/smtpd[3280528]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug  7 10:08:34 mail.srvfarm.net postfix/smtpd[3281311]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug  7 10:10:42 mail.srvfarm.net postfix/smtpd[3293897]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Aug  7 10:12:49 mail.srvfarm.net postfix/smtpd[3293895]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
2020-08-07 16:58:23
89.248.168.51 attack
Unauthorized connection attempt detected from IP address 89.248.168.51 to port 4022 [T]
2020-08-07 17:22:07
85.204.246.240 attackspam
Brute forcing Wordpress login
2020-08-07 17:20:29
119.123.65.208 attackbots
Aug  7 07:07:22 myhostname sshd[23005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.65.208  user=r.r
Aug  7 07:07:23 myhostname sshd[23005]: Failed password for r.r from 119.123.65.208 port 31730 ssh2
Aug  7 07:07:24 myhostname sshd[23005]: Received disconnect from 119.123.65.208 port 31730:11: Bye Bye [preauth]
Aug  7 07:07:24 myhostname sshd[23005]: Disconnected from 119.123.65.208 port 31730 [preauth]
Aug  7 07:10:30 myhostname sshd[25274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.65.208  user=r.r
Aug  7 07:10:32 myhostname sshd[25274]: Failed password for r.r from 119.123.65.208 port 31636 ssh2
Aug  7 07:10:32 myhostname sshd[25274]: Received disconnect from 119.123.65.208 port 31636:11: Bye Bye [preauth]
Aug  7 07:10:32 myhostname sshd[25274]: Disconnected from 119.123.65.208 port 31636 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.
2020-08-07 17:18:32
123.207.178.45 attack
$f2bV_matches
2020-08-07 17:32:39
177.54.250.206 attackspam
Aug  7 05:10:11 mail.srvfarm.net postfix/smtps/smtpd[3189476]: warning: unknown[177.54.250.206]: SASL PLAIN authentication failed: 
Aug  7 05:10:12 mail.srvfarm.net postfix/smtps/smtpd[3189476]: lost connection after AUTH from unknown[177.54.250.206]
Aug  7 05:13:17 mail.srvfarm.net postfix/smtpd[3188840]: warning: unknown[177.54.250.206]: SASL PLAIN authentication failed: 
Aug  7 05:13:17 mail.srvfarm.net postfix/smtpd[3188840]: lost connection after AUTH from unknown[177.54.250.206]
Aug  7 05:16:25 mail.srvfarm.net postfix/smtps/smtpd[3176098]: warning: unknown[177.54.250.206]: SASL PLAIN authentication failed:
2020-08-07 17:09:17
114.224.187.136 attack
2020/08/07 05:35:50 [error] 3709#3709: *1243422 "/usr/share/nginx/html/phpmyadmin/index.html" is not found (2: No such file or directory), client: 114.224.187.136, server: _, request: "GET /phpmyadmin/ HTTP/1.1", host: "185.118.197.130"
2020/08/07 05:35:50 [error] 3709#3709: *1243422 "/usr/share/nginx/html/phpmyadmin/index.html" is not found (2: No such file or directory), client: 114.224.187.136, server: _, request: "GET /phpmyadmin/ HTTP/1.1", host: "185.118.197.130"
2020/08/07 05:35:50 [error] 3709#3709: *1243422 "/usr/share/nginx/html/phpmyadmin/index.html" is not found (2: No such file or directory), client: 114.224.187.136, server: _, request: "GET /phpmyadmin/ HTTP/1.1", host: "185.118.197.130"
2020/08/07 05:35:50 [error] 3709#3709: *1243422 "/usr/share/nginx/html/phpmyadmin/index.html" is not found (2: No such file or directory), client: 114.224.187.136, server: _, request: "GET /phpmyadmin/ HTTP/1.1", host: "185.118.197.130"
2020-08-07 17:00:49
177.107.35.26 attackspambots
SSH Brute Force
2020-08-07 16:52:22
114.242.24.153 attackbots
Aug  7 09:19:16 rush sshd[25824]: Failed password for root from 114.242.24.153 port 52122 ssh2
Aug  7 09:20:30 rush sshd[25845]: Failed password for root from 114.242.24.153 port 37520 ssh2
...
2020-08-07 17:31:28
103.75.197.11 attackbotsspam
Aug  7 05:08:43 mail.srvfarm.net postfix/smtpd[3188840]: warning: unknown[103.75.197.11]: SASL PLAIN authentication failed: 
Aug  7 05:08:43 mail.srvfarm.net postfix/smtpd[3188840]: lost connection after AUTH from unknown[103.75.197.11]
Aug  7 05:12:16 mail.srvfarm.net postfix/smtps/smtpd[3176099]: warning: unknown[103.75.197.11]: SASL PLAIN authentication failed: 
Aug  7 05:12:16 mail.srvfarm.net postfix/smtps/smtpd[3176099]: lost connection after AUTH from unknown[103.75.197.11]
Aug  7 05:16:28 mail.srvfarm.net postfix/smtpd[3188835]: warning: unknown[103.75.197.11]: SASL PLAIN authentication failed:
2020-08-07 17:11:09
49.88.112.75 attack
Aug  7 15:49:43 webhost01 sshd[28307]: Failed password for root from 49.88.112.75 port 35572 ssh2
...
2020-08-07 17:19:41
80.82.65.187 attackbots
Aug  7 08:15:18 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.65.187, lip=185.118.198.210, session=
Aug  7 08:16:41 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.65.187, lip=185.118.198.210, session=
Aug  7 08:16:47 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=80.82.65.187, lip=185.118.198.210, session=
Aug  7 08:16:47 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=80.82.65.187, lip=185.118.198.210, session=
Aug  7 08:16:47 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, m
2020-08-07 17:02:31

最近上报的IP列表

106.4.30.108 101.255.6.95 106.4.30.132 106.4.30.118
106.4.30.140 106.4.30.143 106.4.30.148 106.4.30.160
106.4.30.164 106.4.30.16 106.4.30.147 106.4.30.176
106.4.30.174 101.255.6.98 106.4.30.159 106.4.30.179
106.4.30.182 106.4.30.139 106.4.30.189 106.4.30.198